SlideShare a Scribd company logo
OIR Security Update
Prepared for: Customer Focused Government
April 20th, 2015
Increasing Malware Outbreaks
• February 6th – Virus infected approximately 600 end-user computers within 15
minutes (a total of 793 computers)
• February 13th - Second affects 50 end-user computers
• February 19th - A third outbreak affects 123 end-user computers
• Two of three outbreaks were initiated by state employees accessing personal
email from a state computer (Yahoo and Hotmail)
• Outbreak contained with no state entrusted data lost, but response and
containment costs estimated in excess of $500,000
• March 26th – OIR Security enforces Existing Security Policy prohibiting access to
personal email from state network by blocking employee access to major email
sites
2
State Targeted in Denial of Service (DDoS Attacks)
• March 25th – Hacking Group “Vikingdom” attacks Tennessee taking TN.Gov
offline for a brief period can causing network latency
• Notice sent to IT staff… Channel 4 news calls within 10 minutes. News 4 runs
story on March 26th despite requests
• March 27th – Vikingdom quotes News 4 story in Tweet, vows to bring Tennessee
state web sites down
• March 31st – Second Vikingdom DDoS attack, State security staff switch
TN.GOV IP addresses and separates TN.GOV from State user network limiting
impacts
• March 4th – Vikingdom launches major attack with over 8 Gigabytes of traffic,
impacting citizen access to TN.GOV intermittently
• March 13th – OIR signs contract with AT&T to provide upstream DDoS
protection services
3
4
Intrusion Attempts:
• 234M blocked each month
(92.5M in September 2014, >250% increase)
External Email Gateway:
• 2.5M rated as malicious or SPAM and dropped each month
• 9M processed in and out of the State each month
Internet Content Filtering:
• 4.29B connections each month
• 11.55M connections blocked each month
o 33% blocked for security reasons
o 67% blocked for administrative categories
Infected Devices:
• 120 workstations/laptops each month
Cyber Security Facts and Figures
Our Adversaries Are Highly Motivated
• Cyber Criminals – Fraud and theft
(Hackers average income - $800K per year!)
• Hacktivists – Politically/cause-motivated
(Anonymous, Vikingdom, etc.)
• Governments – Cyber warfare and industrial espionage
(The US Military considers Cyber Warfare the number one threat to
the security of the United States)
• Terrorist Organizations – The newest emerging threat
(Cyber Caliphate, etc.)
5
Challenges in Protecting State Data
• End user device management (consistent patching, hardening, appropriate
user privileges & access)
• Targeting of mobile devices
• “Internet of things” (4.9B devices today, 25B by 2020)
• Ever increasing sophistication of adversaries:
o Targeted attacks
o Ransomware
o Drive by downloads
o Social engineering
• Staff behavior remains the #1 security risk across all sectors
• State must continue a holistic approach of leveraging advanced security
technology, audit and penetration testing, user training, and appropriate
controls
6
When it comes to cyber-security, we
have to win every single battle…
the bad guys only have to win once.

More Related Content

What's hot

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Balvant Biradar
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Yanis Mendez
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
Dharani Adusumalli
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Yanis Mendez
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
anjalika sinha
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
ClubHack
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Kevin Duffey
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
NEW LAW COLLEGE PUNE
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
Kirti Temani
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Vivek Gupta
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
Hacking
Hacking Hacking
Hacking
thajmohammed
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
Ahmed Sleem
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil Mehrotra
Kapil Mehrotra
 
Computer Forensics
Computer ForensicsComputer Forensics
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
Pratham Jaiswal
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Aditya Gurav
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
David J Rosenthal
 
cyber crime
cyber crimecyber crime
cyber crime
Saba MuShtaq
 

What's hot (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Hacking
Hacking Hacking
Hacking
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil Mehrotra
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
cyber crime
cyber crimecyber crime
cyber crime
 

Similar to Customer Focused Government and Computer Security

Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
Chuck Brooks
 
Brooks18
Brooks18Brooks18
Brooks18
Chuck Brooks
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
ArjunKumar684595
 
Meeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptxMeeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptx
othmanomar13
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptx
mnm Lastopop
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
isc2dfw
 
Cyber security
Cyber securityCyber security
Cyber security
TonyYeung23
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
Aditya Singh Rana
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
Michele Thomas
 
hacking.ppt
hacking.ppthacking.ppt
hacking.ppt
ssuserec53e73
 
2hacking.ppt
2hacking.ppt2hacking.ppt
2hacking.ppt
LatinaLatina1
 
Hacking
HackingHacking
Hacking
HackingHacking
Hacking
HackingHacking
Hacking
LutfulM
 
Louisiana Cybersecurity State of Emergency Update
Louisiana Cybersecurity State of Emergency UpdateLouisiana Cybersecurity State of Emergency Update
Louisiana Cybersecurity State of Emergency Update
Ivanti
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
Lillian Ekwosi-Egbulem
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
Parsons Behle & Latimer
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
BakerTillyConsulting
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
Ahmed Tememe
 

Similar to Customer Focused Government and Computer Security (20)

Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Brooks18
Brooks18Brooks18
Brooks18
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Meeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptxMeeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptx
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptx
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
hacking.ppt
hacking.ppthacking.ppt
hacking.ppt
 
2hacking.ppt
2hacking.ppt2hacking.ppt
2hacking.ppt
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Louisiana Cybersecurity State of Emergency Update
Louisiana Cybersecurity State of Emergency UpdateLouisiana Cybersecurity State of Emergency Update
Louisiana Cybersecurity State of Emergency Update
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 

More from TN DCS

Working with Children Who Have Diabetes
Working with Children Who Have DiabetesWorking with Children Who Have Diabetes
Working with Children Who Have Diabetes
TN DCS
 
Child Development
Child DevelopmentChild Development
Child Development
TN DCS
 
Revised Foster Parent Training 1.24.17
Revised Foster Parent Training 1.24.17 Revised Foster Parent Training 1.24.17
Revised Foster Parent Training 1.24.17
TN DCS
 
2016 Permanency Planning Enhancements
2016 Permanency Planning Enhancements2016 Permanency Planning Enhancements
2016 Permanency Planning Enhancements
TN DCS
 
Pregnant women and substance abuse treatment in Tennessee
Pregnant women and substance abuse treatment in TennesseePregnant women and substance abuse treatment in Tennessee
Pregnant women and substance abuse treatment in Tennessee
TN DCS
 
Applying for Positions at DCS
Applying for Positions at DCSApplying for Positions at DCS
Applying for Positions at DCS
TN DCS
 
DCS Budget Presentation Deck for House Civil Justice Committee
DCS Budget Presentation Deck for House Civil Justice CommitteeDCS Budget Presentation Deck for House Civil Justice Committee
DCS Budget Presentation Deck for House Civil Justice Committee
TN DCS
 
Tn dcs cab pilot training 10 29 13
Tn dcs cab pilot training 10 29 13Tn dcs cab pilot training 10 29 13
Tn dcs cab pilot training 10 29 13
TN DCS
 
Stakeholder Survey 2013 UPDATED
Stakeholder Survey 2013 UPDATEDStakeholder Survey 2013 UPDATED
Stakeholder Survey 2013 UPDATED
TN DCS
 

More from TN DCS (9)

Working with Children Who Have Diabetes
Working with Children Who Have DiabetesWorking with Children Who Have Diabetes
Working with Children Who Have Diabetes
 
Child Development
Child DevelopmentChild Development
Child Development
 
Revised Foster Parent Training 1.24.17
Revised Foster Parent Training 1.24.17 Revised Foster Parent Training 1.24.17
Revised Foster Parent Training 1.24.17
 
2016 Permanency Planning Enhancements
2016 Permanency Planning Enhancements2016 Permanency Planning Enhancements
2016 Permanency Planning Enhancements
 
Pregnant women and substance abuse treatment in Tennessee
Pregnant women and substance abuse treatment in TennesseePregnant women and substance abuse treatment in Tennessee
Pregnant women and substance abuse treatment in Tennessee
 
Applying for Positions at DCS
Applying for Positions at DCSApplying for Positions at DCS
Applying for Positions at DCS
 
DCS Budget Presentation Deck for House Civil Justice Committee
DCS Budget Presentation Deck for House Civil Justice CommitteeDCS Budget Presentation Deck for House Civil Justice Committee
DCS Budget Presentation Deck for House Civil Justice Committee
 
Tn dcs cab pilot training 10 29 13
Tn dcs cab pilot training 10 29 13Tn dcs cab pilot training 10 29 13
Tn dcs cab pilot training 10 29 13
 
Stakeholder Survey 2013 UPDATED
Stakeholder Survey 2013 UPDATEDStakeholder Survey 2013 UPDATED
Stakeholder Survey 2013 UPDATED
 

Recently uploaded

PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
PPT Item # 5 - 318 Tuxedo Ave. (sign. review)PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
ahcitycouncil
 
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
yemqpj
 
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
9d5c8i83
 
World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.
Christina Parmionova
 
2024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 382024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 38
JSchaus & Associates
 
State crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public financesState crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public finances
ResolutionFoundation
 
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
3woawyyl
 
Practical guide for the celebration of World Environment Day on june 5th.
Practical guide for the  celebration of World Environment Day on  june 5th.Practical guide for the  celebration of World Environment Day on  june 5th.
Practical guide for the celebration of World Environment Day on june 5th.
Christina Parmionova
 
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
ii2sh2v
 
Antyodaya saral portal haryana govt schemes
Antyodaya saral portal haryana govt schemesAntyodaya saral portal haryana govt schemes
Antyodaya saral portal haryana govt schemes
narinav14
 
PPT Item # 4 - 434 College Blvd. (sign. review)
PPT Item # 4 - 434 College Blvd. (sign. review)PPT Item # 4 - 434 College Blvd. (sign. review)
PPT Item # 4 - 434 College Blvd. (sign. review)
ahcitycouncil
 
Texas Water Development Board Updates June 2024
Texas Water Development Board Updates June 2024Texas Water Development Board Updates June 2024
Texas Water Development Board Updates June 2024
Texas Alliance of Groundwater Districts
 
IEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- StatisticsIEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- Statistics
Energy for One World
 
Transit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group MeetingTransit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group Meeting
Cuyahoga County Planning Commission
 
Abiy Berehe - Texas Commission on Environmental Quality Updates
Abiy Berehe - Texas Commission on Environmental Quality UpdatesAbiy Berehe - Texas Commission on Environmental Quality Updates
Abiy Berehe - Texas Commission on Environmental Quality Updates
Texas Alliance of Groundwater Districts
 
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
yemqpj
 
Border towns and spaces of (in)visibility.pdf
Border towns and spaces of (in)visibility.pdfBorder towns and spaces of (in)visibility.pdf
Border towns and spaces of (in)visibility.pdf
Scalabrini Institute for Human Mobility in Africa
 
RFP for Reno's Community Assistance Center
RFP for Reno's Community Assistance CenterRFP for Reno's Community Assistance Center
RFP for Reno's Community Assistance Center
This Is Reno
 
PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)
ahcitycouncil
 
About Potato, The scientific name of the plant is Solanum tuberosum (L).
About Potato, The scientific name of the plant is Solanum tuberosum (L).About Potato, The scientific name of the plant is Solanum tuberosum (L).
About Potato, The scientific name of the plant is Solanum tuberosum (L).
Christina Parmionova
 

Recently uploaded (20)

PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
PPT Item # 5 - 318 Tuxedo Ave. (sign. review)PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
 
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
 
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
 
World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.
 
2024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 382024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 38
 
State crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public financesState crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public finances
 
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
 
Practical guide for the celebration of World Environment Day on june 5th.
Practical guide for the  celebration of World Environment Day on  june 5th.Practical guide for the  celebration of World Environment Day on  june 5th.
Practical guide for the celebration of World Environment Day on june 5th.
 
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
 
Antyodaya saral portal haryana govt schemes
Antyodaya saral portal haryana govt schemesAntyodaya saral portal haryana govt schemes
Antyodaya saral portal haryana govt schemes
 
PPT Item # 4 - 434 College Blvd. (sign. review)
PPT Item # 4 - 434 College Blvd. (sign. review)PPT Item # 4 - 434 College Blvd. (sign. review)
PPT Item # 4 - 434 College Blvd. (sign. review)
 
Texas Water Development Board Updates June 2024
Texas Water Development Board Updates June 2024Texas Water Development Board Updates June 2024
Texas Water Development Board Updates June 2024
 
IEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- StatisticsIEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- Statistics
 
Transit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group MeetingTransit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group Meeting
 
Abiy Berehe - Texas Commission on Environmental Quality Updates
Abiy Berehe - Texas Commission on Environmental Quality UpdatesAbiy Berehe - Texas Commission on Environmental Quality Updates
Abiy Berehe - Texas Commission on Environmental Quality Updates
 
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
 
Border towns and spaces of (in)visibility.pdf
Border towns and spaces of (in)visibility.pdfBorder towns and spaces of (in)visibility.pdf
Border towns and spaces of (in)visibility.pdf
 
RFP for Reno's Community Assistance Center
RFP for Reno's Community Assistance CenterRFP for Reno's Community Assistance Center
RFP for Reno's Community Assistance Center
 
PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)
 
About Potato, The scientific name of the plant is Solanum tuberosum (L).
About Potato, The scientific name of the plant is Solanum tuberosum (L).About Potato, The scientific name of the plant is Solanum tuberosum (L).
About Potato, The scientific name of the plant is Solanum tuberosum (L).
 

Customer Focused Government and Computer Security

  • 1. OIR Security Update Prepared for: Customer Focused Government April 20th, 2015
  • 2. Increasing Malware Outbreaks • February 6th – Virus infected approximately 600 end-user computers within 15 minutes (a total of 793 computers) • February 13th - Second affects 50 end-user computers • February 19th - A third outbreak affects 123 end-user computers • Two of three outbreaks were initiated by state employees accessing personal email from a state computer (Yahoo and Hotmail) • Outbreak contained with no state entrusted data lost, but response and containment costs estimated in excess of $500,000 • March 26th – OIR Security enforces Existing Security Policy prohibiting access to personal email from state network by blocking employee access to major email sites 2
  • 3. State Targeted in Denial of Service (DDoS Attacks) • March 25th – Hacking Group “Vikingdom” attacks Tennessee taking TN.Gov offline for a brief period can causing network latency • Notice sent to IT staff… Channel 4 news calls within 10 minutes. News 4 runs story on March 26th despite requests • March 27th – Vikingdom quotes News 4 story in Tweet, vows to bring Tennessee state web sites down • March 31st – Second Vikingdom DDoS attack, State security staff switch TN.GOV IP addresses and separates TN.GOV from State user network limiting impacts • March 4th – Vikingdom launches major attack with over 8 Gigabytes of traffic, impacting citizen access to TN.GOV intermittently • March 13th – OIR signs contract with AT&T to provide upstream DDoS protection services 3
  • 4. 4 Intrusion Attempts: • 234M blocked each month (92.5M in September 2014, >250% increase) External Email Gateway: • 2.5M rated as malicious or SPAM and dropped each month • 9M processed in and out of the State each month Internet Content Filtering: • 4.29B connections each month • 11.55M connections blocked each month o 33% blocked for security reasons o 67% blocked for administrative categories Infected Devices: • 120 workstations/laptops each month Cyber Security Facts and Figures
  • 5. Our Adversaries Are Highly Motivated • Cyber Criminals – Fraud and theft (Hackers average income - $800K per year!) • Hacktivists – Politically/cause-motivated (Anonymous, Vikingdom, etc.) • Governments – Cyber warfare and industrial espionage (The US Military considers Cyber Warfare the number one threat to the security of the United States) • Terrorist Organizations – The newest emerging threat (Cyber Caliphate, etc.) 5
  • 6. Challenges in Protecting State Data • End user device management (consistent patching, hardening, appropriate user privileges & access) • Targeting of mobile devices • “Internet of things” (4.9B devices today, 25B by 2020) • Ever increasing sophistication of adversaries: o Targeted attacks o Ransomware o Drive by downloads o Social engineering • Staff behavior remains the #1 security risk across all sectors • State must continue a holistic approach of leveraging advanced security technology, audit and penetration testing, user training, and appropriate controls 6
  • 7. When it comes to cyber-security, we have to win every single battle… the bad guys only have to win once.

Editor's Notes

  1. Gartner estimates that we will have 26 Billion devices connected to the internet by 2020